Tuesday, May 13, 2025
HomeExploitation Tools4CAN - Cisco Released New Open Source Security Tool to Find Security...

4CAN – Cisco Released New Open Source Security Tool to Find Security Vulnerabilities in Modern Cars

Published on

SIEM as a Service

Follow Us on Google News

Cisco released an open-source hardware tool called “4CAN” for automobile security researchers and car manufacturers to find the potential security vulnerabilities in connected cars to ensure vehicle security.

Automobile systems such as cars integrated with hundreds of sensors and control systems that connected with computers and communicate with software systems in order to provide various features to the driver.

Vulnerabilities in these systems and the software that controls the car will cause serious threats in modern cars even it allows hackers to remote control of the vehicle.

- Advertisement - Google News

New hardware security tool 4CAN let security researchers perform a variety of security assessments in components that connected with the vehicle such as Wi-Fi, Bluetooth, and cellular communication protocol, Controller Area Network (CAN)also called as CAN bus.”

If hackers physically access to the CAN bus via an ODB2 connector that fixed on the driver-side lower dash easily take complete control of the vehicle.

CAN bus communicate with various critical components including airbags and brakes and other non-critical components such as radio or interior lights.

By accessing the CAN bus, penetration testers and researchers can test the separate component to find the vulnerabilities.

4CAN

George Tarnovsky, a member of Cisco’s  Customer Experience Assessment & Penetration Team (CX APT) designed the 4CAN with the various perspective of analysing the vulnerabilities and following goals.

1. Validating communication policy for intra-CAN bus communication.
2. Fuzzing (sending randomized payloads) to components to identify vulnerabilities.
3. Exploring the CAN commands used to control/interact with the vehicle.
4. Simplify our testbench set up to keep everything organized and in sync.

Before 4CAN arrives, There are three CAN devices required to simultaneously test four CAN buses.  

“Along with that Two TT3201 three-channel CAN Capes attached to Beaglebones, and one CanBerryDual attached to a Raspberry Pi. also another Raspberry Pi to remotely control the test vehicle.”

With this configuration, we can test sending CAN frames between any two combinations of CAN channels but the testing process is very difficult which required to set up a lot of wires making the connection.

4CAN
Credits: CISCO

According to Cisco, “Using 4CAN, the test bench setup is vastly simplified. With a single Raspberry Pi, we can simultaneously test four CAN channel, and since the 4CAN exposes the entire 40-pin GPIO header, we can remotely control the test vehicle.”

4CAN
4CAN setup (Credits: CISCO)

4CAN allow the researchers to test the vulnerabilities including sniff CAN traffic, send CAN messages, replay captured CAN traffic, implement a CAN gateway to facilitate CAN-in-the-middle and other tests.

You can down download the 4CAN from GitHub.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking New updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Researchers Introduce Mythic Framework Agent to Enhance Pentesting Tool Performance

Penetration testing is still essential for upholding strong security procedures in a time when...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks

Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit...

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

Windows 11 BitLocker Bypassed to Extract Encryption Keys

An attacker with physical access can abruptly restart the device and dump RAM, as...